Sciweavers

2691 search results - page 43 / 539
» Securing Ad Hoc Networks
Sort
View
IPPS
2003
IEEE
15 years 5 months ago
Ad Hoc Networks: A Protocol for Supporting QoS Applications
A delay-bounded service in wireless ad hoc networks is challenging, as ad hoc networks do not provide any type of guarantees. Several protocols have been proposed to support appli...
Lorenzo Donatiello, Marco Furini
ADHOC
2006
155views more  ADHOC 2006»
14 years 12 months ago
Application versus network layer multicasting in ad hoc networks: the ALMA routing protocol
Application layer multicasting has emerged as an appealing alternative to network layer multicasting in wireline networks. Here, we examine the suitability of application layer mu...
Min Ge, Srikanth V. Krishnamurthy, Michalis Falout...
CORR
2011
Springer
536views Education» more  CORR 2011»
14 years 6 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...
COMCOM
2002
185views more  COMCOM 2002»
14 years 11 months ago
Infrastructure-based routing in wireless mobile ad hoc networks
In this paper, we propose a new protocol for wireless mobile ad hoc communications, which establishes a dynamic wireless mobile infrastructure to mimic and maintain the operation ...
Ahmed M. Safwat, Hossam S. Hassanein
ENTCS
2007
131views more  ENTCS 2007»
14 years 11 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo